setup.exe

TINY INSTALLER

Tiny Installer is a download manager variant from Adknowledge that packages various adware-type offers (toolbar, coupon extensions, utilities) with software distributions. The application setup.exe by TINY INSTALLER has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from cpadominator.com.
Publisher:
ExpressInstaller  (signed by TINY INSTALLER)

Product:
ExpressInstaller

Version:
3, 7, 1, 0

MD5:
be02fe2f312e7eaf57254b59f6a6c6e3

SHA-1:
fce40ee65ba2074f21d4568d4d7044efaf8365c8

SHA-256:
ea7f57f7e90b85b978654581909fd787cf1b307f11c9c1e890ed162bff2fbb7a

Scanner detections:
27 / 68

Status:
Adware

Explanation:
The Tiny Installer download manager bundles various adware components.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/27/2024 2:56:38 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Trojan.Kryptik
7.1.1

AhnLab V3 Security
Adware/Win32.IBryte
16.01.12

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.141.72

avast!
Win32:IBryte-BT [PUP]
2014.9-160112

AVG
Adware Skodna.Bundle
2017.0.2867

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.Adware.iBryte.BAA
18047

Dr.Web
Adware.Downware.1532, Adware.Downware.1554
9.0.1.012

ESET NOD32
Win32/AdWare.iBryte.G application
10.7.0.302.0

Fortinet FortiGate
Riskware/PremiumInstaller
1/12/2016

F-Prot
W32/S-53fc0c37
v6.4.7.1.166

G Data
Win32.Application.Ibryte.AF
16.1.25

IKARUS anti.virus
Trojan.Win32.Buzus
t3scan.2.2.29

K7 AntiVirus
Trojan
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.829

Malwarebytes
PUP.Optional.iBryte
v2016.01.12.02

NANO AntiVirus
Trojan.Win32.Buzus.cspkmx
0.28.0.58873

nProtect
Trojan-Clicker/W32.iBryte.1641768
14.04.04.01

Panda Antivirus
Trj/Genetic.gen
16.01.12.02

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.EK4
1.16.14.00

Reason Heuristics
PUP.Adknowledge.TINYINSTALLER.Installer (M)
16.1.12.2

Rising Antivirus
PE:Malware.Graftor!6.4B7
23.00.65.16110

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
28036

Zillya! Antivirus
Adware.iBryte.Win32.657
2.0.0.1789

File size:
1.6 MB (1,704,744 bytes)

Product version:
3, 7, 1, 0

Copyright:
Copyright (C) 2013 ExpressInstaller

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/3/2013 1:00:00 AM

Valid to:
6/4/2014 12:59:59 AM

Subject:
CN=TINY INSTALLER, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TINY INSTALLER, L=Wilmington, S=Delaware, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
54C184C0CB6B6510B3582483FC098463

File PE Metadata
Compilation timestamp:
10/15/2013 9:49:44 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:+zX+xZemvChdTw5jriS7h5c/yUMMJS67pys:yuxZemvcdvM+KU3Jlys

Entry address:
0x364E5

Entry point:
E8, 5E, 8C, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, F0, 5B, 47, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 78, 98, 59, 00, 77, 22, 6A, 04, E8, 61, 8E, 00, 00, 59, 83, 65, FC, 00, 56, E8, C3, 9B, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, 44, 8D, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, D4, 84, 59, 00, 00, 75, 18, E8, 99, 81, 00, 00, 6A, 1E, E8, C1, 7F, 00, 00, 68, FF, 00, 00, 00, E8, D7, 4C, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.1063

Code size:
393 KB (402,432 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security